CVE-2019-12928

Scores

EPSS

0.541medium54.1%
0%20%40%60%80%100%

Percentile: 54.1%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU’s -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-78

Vulnerable Software (8)

Type: Configuration

Product: qemu

Operating System: ubuntu bionic 18.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: qemu

Operating System: ubuntu cosmic 18.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: qemu

Operating System: ubuntu disco 19.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: qemu

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: qemu

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: qemu

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: qemu-kvm

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Vendor: *

Product: qemu

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",      "versionEndIncluding": "4.0.0",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list